Recent content by batric

  1. B

    Questions about exploited SMTP relay

    No problems :) After inspecting the logs, I found the way they were connecting - one of the email addresses had a "[email protected]" with password of "123456". Spammers were randomly trying to check common email names on every domain on the server: info, contact, admin, test, support, etc...
  2. B

    Questions about exploited SMTP relay

    Thanks for the message.
  3. B

    Questions about exploited SMTP relay

    Hello, I'm using SmarterMail on Windows Server 2008. I changed the SMTP relay from "Nobody" to "Only local users" and in last 2 days I had a large number of outgoing spam messages sent from my server (close to 6.000). This has happened in the past, and setting SMTP relay back to "Nobody" has...
Back
Top